Chapter 10 Review Questions Flashcards

1
Q

Because of a recent string of thefts in your office, you need to harden your local system. What two actions are most appropriate for your situation? (Choose two.)

A. Install a hardware lock.
B. Disable unused services.
C. Install anti-malware.
D. Enable encryption.

A

Install a hardware lock

Enable encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What option can you configure on your workstation to increase security when you leave your desk?

A. File encryption
B. Multifactor authentication
C. Single sign-on
D. Screensaver password

A

Screensaver password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You have just landed at an airport and have an unexpected six-hour layover. You want to use your smartphone to get some work done. What should you disable as a precautionary device-hardening measure to help prevent potential attacks? (Choose two.)

A. Autofill
B. Bluetooth
C. NFC
D. FFC

A

Bluetooth

NFC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Claire, a co-worker, is browsing the Internet and wants to know whether it’s safe to enter her credit card information into a website. What do you tell her to look for?

A. HTTPS://
B. HTTP://
C. SSL://
D. TLS://

A

HTTPS://

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You enabled file encryption on your local computer. While you were on vacation, one of your co-workers managed to get onto your computer and share your important files with other users. How did they do this?

A. They logged on and disabled encryption.
B. They used the Disk Recovery tool to access the encrypted files.
C. All users logging into the system have access to encrypted files.
D. They logged on with your username and password.

A

They logged on with your username and password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following types of data should be considered confidential and handled appropriately? (Choose two.)

A. Financial information
B. Social networking site
C. Customer information
D. Contact information

A

Financial information

Customer information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of software will help protect your computer from malicious network traffic?

A. Software firewall
B. Password complexity tool
C. Antispyware
D. Antivirus

A

Software firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are using Google Chrome, and you want to ensure that when you type in your first name to a web page, all of your other information fills in the fields for you. What should you do?

A. Enable cookies.
B. Enable cache.
C. Enable Incognito.
D. Enable autofill.

A

Enable autofill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Your manager just got a new workstation. He wants to know which user accounts he should disable to increase security. What should you tell him to disable?

A. Guest
B. Users
C. Power Users
D. Administrator

A

Guest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following actions is not considered a web browsing best practice?

A. Limiting the use of PII
B. Disabling autofill
C. Closing untrusted source warnings
D. Updating plugins and toolbars

A

Closing untrusted source warnings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The managers at your company have decided to implement stricter security policies on the company’s local network. Which of the following should they do? (Choose two.)

A. Enforce password policies.
B. Develop written policies and procedures.
C. Disable host firewalls.
D. Enable HTTPS on the corporate web server.

A

Enforce password policies.

Develop written policies and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Your co-worker Rachel has recently discovered that when she starts typing her name into a field in a web browser, her whole name appears as well as her address in the appropriate boxes. What is this due to?

A. Adware infection
B. Single sign-on
C. Suspicious hyperlinks
D. Autofill

A

Autofill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You have been asked to give training on network security. For your section on password management, which options should you recommend to users? (Choose two.)

A. Do not use complex passwords because they are easy to forget.
B. Change default passwords on systems.
C. Use the same password on multiple systems so that they are easy to remember.
D. Do not reuse the same password after you are required to change it.

A

Change default passwords on systems.

Do not reuse the same password after you are required to change it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are in a library that has free computers to use for Internet browsing. Which of the following should you possibly be concerned about?

A. Shoulder surfing
B. Keyloggers 
C. Unsecured wireless network 
D. A and B 
E. A, B, and C
A

E. A, B, and C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You have remotely logged into your corporate network. Which of the following is used to ensure encryption of data in transit between your laptop and corporate servers?

A. HTTPS
B. Email encryption
C. VPN
D. Host firewall

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following are considered characteristics of a strong password? (Choose two.)

A. Long
B. Uses patterns
C. Uses symbols, numbers, and letters
D. Contains PII

A

Long

Use symbols, numbers, and letters

17
Q

You just read an article about an Internet worm recently causing problems. What type of software should you install to protect yourself from this worm?

A. Software firewall
B. Antispyware
C. Antivirus
D. Antispam

A

Antivirus

18
Q

You receive an email in your inbox from your friend Sara. The title of the email is “This is so cool!” and inside the email is an attachment with an .exe extension. What should you do?

A. Delete the email.
B. Click the attachment.
C. Run virus scan; then click the attachment.
D. Call Sara to see if she sent you the email.

A

Run virus scan; then click the attachment

19
Q

You recently received a new workstation and need to secure it properly before browsing the Internet. Which actions should you take? (Choose two.)

A. Enable autofill.
B. Enable acceptance of cookies.
C. Upgrade your browser to the newest version.
D. Install an antivirus package.

A

Upgrade your browser to the newest version.

Install an antivirus package.

20
Q

Which of the following statements is true regarding web browser plugins, toolbars, and extensions?

A. They should be updated to the newest versions.
B. They are dangerous and should be deleted.
C. They will be detected and removed by antivirus software.
D. They only function in Microsoft Edge or Internet Explorer.

A

They should be updated to the newest versions